Elementor #2421
Comptia A+
Overview
What is it?
CompTIA A+ certified professionals are proven problem solvers. They support today’s
core technologies from security to cloud to data management and more. CompTIA
A+ is the industry standard for launching IT careers into today’s digital world.
Why is it different?
CompTIA A+ is the only industry recognized credential with performance-based items to prove
pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by
employers around the world to identify the go-to person in end point management & technical
support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core
skills and abilities demanded in the workplace.
About the exam
CompTIA A+ is the preferred performance-based qualifying credential for technical support and
IT operational roles. A+ certified professionals identify issues and problem solve more effectively
than those without certification. CompTIA A+ supports the ability to connect users to the data
they need to do their jobs regardless of the devices being used. In order to receive the CompTIA A+
certification, candidates must pass two exams: Core 1 (220-1001) and Core 2 (220-1002).
Successful candidates will have the skills to:
• Support basic IT infrastructure, including endpoint management, advanced device connectivity
troubleshooting, and basic networking
• Configure and support PC, mobile and IoT device hardware, including components, connectors
and peripherals
• Implement basic data backup and recovery methods and apply data storage and management
best practices
• Demonstrate baseline security skills for IT support professionals, including detecting and
removing malware, addressing privacy concerns, physical security and device hardening
• Configure device operating systems, including Windows, Mac, Linux, Chrome OS, Android and
iOS and administer client-based as well as cloud-based (SaaS) software
• Troubleshoot and problem solve core service and support challenges while applying best
practices for documentation, change management, and the use of scripting in IT support
Top A+ Job Titles
• Service Desk Analyst
• Help Desk Tech
• Technical Support Specialist
• Field Service Technician
• Associate Network Engineer
• Data Support Technician
• Desktop Support Administrator
• End User Computing Technician
• Help Desk Technician
• System Support Specialist
Course Objectives
In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will:
• Assess cybersecurity risks to the organization.
• Analyze the threat landscape.
• Analyze various reconnaissance threats to computing and network environments.
• Analyze various attacks on computing and network environments.
• Analyze various post-attack techniques.
• Assess the organization’s security posture through auditing, vulnerability management, and
penetration testing.
• Collect cybersecurity intelligence from various network-based and host-based sources.
• Analyze log data to reveal evidence of threats and incidents.
• Perform active asset and network analysis to detect incidents.
• Respond to cybersecurity incidents using containment, mitigation, and recovery tactics.
• Investigate cybersecurity incidents using forensic analysis techniques.
Our Instructors
All of our instructors are certified and experienced in the certifications they teach.
We hold a view that anyone who instructs others should have at least once walked in their shoes.
Instructor
Lewis Roberts
CEH | CHFI | Bsc Cybersecurity | CFR | Cybersafe | CySA | Pentest+ | Network + | Security+ | A+ | CISSP
Course Content 220-1101 (A+ Core1)
• Install and configure laptop & components
• Compare and contrast characteristics of various types of other mobile devices
• Connect and configure accessories and ports of other mobile devices & accessories
• Configure basic mobile device network connectivity and application support
• Use methods to perform mobile device synchronization
• Compare and contrast TCP and UDP ports, protocols, and their purposes
• Compare and contrast common networking hardware devices
• Install and configure a basic wired/wireless SOHO network
• Compare and contrast wireless networking protocols
• Summarize the properties and purposes of services provided by networked hosts
• Explain common network configuration concepts
• Compare and contrast Internet connection types, network types, and their features
• Explain basic cable and connector types, features, and their purposes
• Summarize power supply types and features
• Select and configure appropriate components & devices for a custom PC configuration to meet customer specifications or needs
• Configure SOHO multifunction devices/ printers and settings
• Install and maintain various print technologies
Topic A: Assess the Impact of System Hacking Attacks
Topic B: Assess the Impact of Web-Based Attacks
Topic C: Assess the Impact of Malware
Topic D: Assess the Impact of Hijacking and Impersonation Attacks
Topic E: Assess the Impact of DoS Incidents
Topic F: Assess the Impact of Threats to Mobile Security
Topic G: Assess the Impact of Threats to Cloud Security
Topic A: Assess Command and Control Techniques
Topic B: Assess Persistence Techniques
Topic C: Assess Lateral Movement and Pivoting Techniques
Topic D: Assess Data Exfiltration Techniques
Topic E: Assess Anti-Forensics Techniques
Topic A: Implement Cybersecurity Auditing
Topic B: Implement a Vulnerability Management Plan
Topic C: Assess Vulnerabilities
Topic D: Conduct Penetration Testing
Topic A: Deploy a Security Intelligence Collection and Analysis Platform
Topic B: Collect Data from Network-Based Intelligence Sources
Topic C: Collect Data from Host-Based Intelligence Sources
Topic A: Use Common Tools to Analyze Logs
Topic B: Use SIEM Tools for Analysis
Topic A: Analyze Incidents with Windows-Based Tools
Topic B: Analyze Incidents with Linux-Based Tools
Topic C: Analyze Indicators of Compromise
Topic A: Deploy an Incident Handling and Response Architecture
Topic B: Mitigate Incidents
Topic C: Hand Over Incident Information to a Forensic Investigation
Topic A: Apply a Forensic Investigation Plan
Topic B: Securely Collect and Analyze Electronic Evidence
Topic C: Follow Up on the Results of an Investigation
Heard enough? check our
Upcoming Dates
Virtual Classroom
12th - 16th June 2023-
09:00 am - 16:30 pm
-
Live instruction virtual class
-
Courseware + Exam included
-
5 Days
Virtual Classroom
TBA-
09:00 am - 16:30 pm
-
Live instruction virtual class
-
Courseware + Exam included
-
5 Days
Virtual Classroom
TBA-
09:00 am - 16:30 pm
-
Live instruction virtual class
-
Courseware + Exam included
-
5 Days